Server IP : 195.201.23.43 / Your IP : 3.15.189.95 Web Server : Apache System : Linux webserver2.vercom.be 5.4.0-192-generic #212-Ubuntu SMP Fri Jul 5 09:47:39 UTC 2024 x86_64 User : kdecoratie ( 1041) PHP Version : 7.1.33-63+ubuntu20.04.1+deb.sury.org+1 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /usr/share/doc/cryptsetup/ |
Upload File : |
Cryptsetup 1.4.2 Release Notes ============================== Changes since version 1.4.1 * Add --keyfile-offset and --new-keyfile-offset parameters to API and CLI. These options can be used to skip start of keyfile or device used as keyfile. * Add repair command and crypt_repair() for known LUKS metadata problems repair. Some well-known LUKS metadata corruptions are easy to repair, this command should provide a way to fix these problems. Always create binary backup of header device before running repair, (only 4kB - visible header) for example by using dd: dd if=/dev/<LUKS header device> of=repair_bck.img bs=1k count=4 Then you can try to run repair: cryptsetup repair <device> Note, not all problems are possible to repair and if keyslot or some header parameters are overwritten, device is lost permanently. * Fix header check to support old (cryptsetup 1.0.0) header alignment. (Regression in 1.4.0) * Allow to specify --align-payload only for luksFormat. * Add --master-key-file option to luksOpen (open using volume key). * Support UUID=<LUKS_UUID> format for device specification. You can open device by UUID (only shortcut to /dev/disk/by-uuid/ symlinks). * Support password verification with quiet flag if possible. (1.2.0) Password verification can be still possible if input is terminal. * Fix retry if entered passphrases (with verify option) do not match. (It should retry if requested, not fail.) * Fix use of empty keyfile. * Fix error message for luksClose and detached LUKS header. * Allow --header for status command to get full info with detached header.Private